{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T15:39:25Z","timestamp":1771861165195,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":40,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811391804","type":"print"},{"value":"9789811391811","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-9181-1_53","type":"book-chapter","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T02:03:22Z","timestamp":1563501802000},"page":"611-623","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["StackDroid: Evaluation of a Multi-level Approach for Detecting the Malware on Android Using Stacked Generalization"],"prefix":"10.1007","author":[{"given":"Sheikh Shah Mohammad","family":"Motiur Rahman","sequence":"first","affiliation":[]},{"given":"Sanjit Kumar","family":"Saha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,20]]},"reference":[{"key":"53_CR1","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-319-78816-6_18","volume-title":"Security and Privacy in Communication Networks","author":"S Sen","year":"2018","unstructured":"Sen, S., Aysan, A.I., Clark, J.A.: SAFEDroid: using structural features for detecting android malwares. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICSSITE, vol. 239, pp. 255\u2013270. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-78816-6_18"},{"key":"53_CR2","first-page":"23","volume":"14","author":"D Arp","year":"2014","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.E.R.T.: DREBIN: effective and explainable detection of android malware in your pocket. NDSS 14, 23\u201326 (2014)","journal-title":"NDSS"},{"key":"53_CR3","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/TDSC.2016.2536605","volume":"15","author":"A Saracino","year":"2016","unstructured":"Saracino, A., Sgandurra, D., Dini, G., Martinelli, F.: MADAM: effective and efficient behavior-based android malware detection and prevention. IEEE Trans. Depend. Secure Comput. 15, 83\u201397 (2016)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"53_CR4","unstructured":"Reina, A., Fattori, A., Cavallaro, L.: A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors. In: EuroSec, April 2013"},{"key":"53_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-642-54568-9_14","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"M Backes","year":"2014","unstructured":"Backes, M., Gerling, S., Hammer, C., Maffei, M., von Styp-Rekowsky, P.: AppGuard \u2013 fine-grained policy enforcement for untrusted android applications. In: Garcia-Alfaro, J., Lioudakis, G., Cuppens-Boulahia, N., Foley, S., Fitzgerald, W.M. (eds.) DPM\/SETOP -2013. LNCS, vol. 8247, pp. 213\u2013231. Springer, Heidelberg (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-642-54568-9_14"},{"key":"53_CR6","first-page":"19","volume":"17","author":"S Bugiel","year":"2012","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.R., Shastry, B.: Towards taming privilege-escalation attacks on android. NDSS 17, 19 (2012)","journal-title":"NDSS"},{"key":"53_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","volume-title":"Trust and Trustworthy Computing","author":"C Gibler","year":"2012","unstructured":"Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291\u2013307. Springer, Heidelberg (2012). \n                    https:\/\/doi.org\/10.1007\/978-3-642-30921-2_17"},{"key":"53_CR8","unstructured":"Viswanath, H., Mehtre, B.M.: U.S. Patent No. 9,959,406, U.S. Patent and Trademark Office, Washington, DC (2018)"},{"key":"53_CR9","doi-asserted-by":"crossref","unstructured":"Zhong, X., Zeng, F., Cheng, Z., Xie, N., Qin, X., Guo, S.: Privilege escalation detecting in android applications. In: 2017 3rd International Conference on Big Data Computing and Communications (BIGCOM), pp. 9\u201344. IEEE (2017)","DOI":"10.1109\/BIGCOM.2017.21"},{"key":"53_CR10","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","volume-title":"Security and Privacy in Communication Networks","author":"Y Aafer","year":"2013","unstructured":"Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in android. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICST, vol. 127, pp. 86\u2013103. Springer, Cham (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-319-04283-1_6"},{"key":"53_CR11","unstructured":"Demontis, A., et al.: Yes, machine learning can be more secure! a case study on Android malware detection. IEEE Trans. Depend. Secure Comput. (2017)"},{"key":"53_CR12","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.neucom.2017.08.072","volume":"280","author":"H Papadopoulos","year":"2018","unstructured":"Papadopoulos, H., Georgiou, N., Eliades, C., Konstantinidis, A.: Android malware detection with unbiased confidence guarantees. Neurocomputing. 280, 312 (2018)","journal-title":"Neurocomputing."},{"issue":"1","key":"53_CR13","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.istr.2009.03.003","volume":"14","author":"A Shabtai","year":"2009","unstructured":"Shabtai, A., Moskovitch, R., Elovici, Y., Glezer, C.: Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey. Inf. Secur. Tech. Rep. 14(1), 16\u201329 (2009)","journal-title":"Inf. Secur. Tech. Rep."},{"issue":"2","key":"53_CR14","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/2089125.2089126","volume":"44","author":"M Egele","year":"2012","unstructured":"Egele, M., Scholte, T., Kirda, E., Kruegel, C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. (CSUR) 44(2), 6 (2012)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"53_CR15","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326. ACM (2011)","DOI":"10.1145\/2046614.2046619"},{"issue":"2","key":"53_CR16","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","author":"DH Wolpert","year":"1992","unstructured":"Wolpert, D.H.: Stacked generalization. Neural Netw. 5(2), 241\u2013259 (1992)","journal-title":"Neural Netw."},{"key":"53_CR17","doi-asserted-by":"crossref","unstructured":"Sahs, J., Khan, L.: A machine learning approach to android malware detection. In: Intelligence and Security Informatics Conference (EISIC), pp. 141\u2013147. IEEE (2012)","DOI":"10.1109\/EISIC.2012.34"},{"key":"53_CR18","unstructured":"Scikit-learn: machine learning in Python Scikit-learn 0.19.1 documentation. \n                    http:\/\/scikit-learn.org\/stable\/"},{"key":"53_CR19","doi-asserted-by":"crossref","unstructured":"Yerima, S.Y., Sezer, S., McWilliams, G., Muttik, I.: A new android malware detection approach using Bayesian classification. In: IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp. 121\u2013128 (2013)","DOI":"10.1109\/AINA.2013.88"},{"key":"53_CR20","doi-asserted-by":"crossref","unstructured":"Wu, W.C., Hung, S.H.: DroidDolphin: a dynamic Android malware detection framework using big data and machine learning. In: 2014 Conference on Research in Adaptive and Convergent Systems, pp. 247\u2013252. ACM (2014)","DOI":"10.1145\/2663761.2664223"},{"issue":"3","key":"53_CR21","first-page":"27","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"issue":"4","key":"53_CR22","first-page":"251","volume":"26","author":"A Feizollah","year":"2014","unstructured":"Feizollah, A., Anuar, N.B., Salleh, R., Amalina, F., Ma\u2019arof, R.U.R., Shamshirband, S.: A study of machine learning classifiers for anomaly-based mobile botnet detection. Malays. J. Comput. Sci. 26(4), 251\u2013265 (2014). (in Malaysian)","journal-title":"Malays. J. Comput. Sci."},{"key":"53_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.diin.2015.01.001","volume":"13","author":"KA Talha","year":"2015","unstructured":"Talha, K.A., Alper, D.I., Aydin, C.: APK auditor: permission-based Android malware detection system. Digit. Invest. 13, 1\u201314 (2015)","journal-title":"Digit. Invest."},{"key":"53_CR24","unstructured":"Urcuqui, C., Navarro, A.: Machine learning classifiers for android malware analysis. In: IEEE Colombian Conference on Communications and Computing (COLCOM), pp. 1\u20136 (2016)"},{"key":"53_CR25","doi-asserted-by":"publisher","first-page":"3979","DOI":"10.1007\/s11042-017-5104-0","volume":"78","author":"X Xiao","year":"2019","unstructured":"Xiao, X., Zhang, S., Mercaldo, F., Hu, G., Sangaiah, A.K.: Android malware detection based on system call sequences and LSTM. Multimedia Tools Appl. 78, 3979\u20133999 (2019)","journal-title":"Multimedia Tools Appl."},{"key":"53_CR26","doi-asserted-by":"crossref","unstructured":"Wang, C., Xu, Q., Lin, X., Liu, S.: Research on data mining of permissions mode for Android malware detection. Clust. Comput. 1\u201314 (2018)","DOI":"10.1007\/s10586-018-1904-x"},{"key":"53_CR27","unstructured":"Python package for stacking (machine learning technique). \n                    https:\/\/github.com\/vecxoz\/vecstack"},{"issue":"1","key":"53_CR28","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3758\/BF03213026","volume":"9","author":"JT Townsend","year":"1971","unstructured":"Townsend, J.T.: Theoretical analysis of an alphabetic confusion matrix. Percept. Psychophys. 9(1), 40\u201350 (1971)","journal-title":"Percept. Psychophys."},{"key":"53_CR29","doi-asserted-by":"crossref","unstructured":"Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves. In: Proceedings of the 23rd International Conference on Machine Learning, pp. 233\u2013240. ACM (2006)","DOI":"10.1145\/1143844.1143874"},{"key":"53_CR30","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1007\/11941439_114","volume-title":"AI 2006: Advances in Artificial Intelligence","author":"M Sokolova","year":"2006","unstructured":"Sokolova, M., Japkowicz, N., Szpakowicz, S.: Beyond accuracy, F-score and ROC: a family of discriminant measures for performance evaluation. In: Sattar, A., Kang, B. (eds.) AI 2006. LNCS (LNAI), vol. 4304, pp. 1015\u20131021. Springer, Heidelberg (2006). \n                    https:\/\/doi.org\/10.1007\/11941439_114"},{"key":"53_CR31","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-642-40994-3_29","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"K Boyd","year":"2013","unstructured":"Boyd, K., Eng, K.H., Page, C.D.: Area under the precision-recall curve: point estimates and confidence intervals. In: Blockeel, H., Kersting, K., Nijssen, S., \u017delezn\u00fd, F. (eds.) ECML PKDD 2013. LNCS (LNAI), vol. 8190, pp. 451\u2013466. Springer, Heidelberg (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-642-40994-3_29"},{"issue":"1","key":"53_CR32","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10994-006-6226-1","volume":"63","author":"P Geurts","year":"2006","unstructured":"Geurts, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63(1), 3\u201342 (2006)","journal-title":"Mach. Learn."},{"issue":"1","key":"53_CR33","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"53_CR34","series-title":"Lecture Notes in Geoinformation and Cartography","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-319-60801-3_27","volume-title":"Geomatic Approaches for Modeling Land Change Scenarios","author":"H Taud","year":"2018","unstructured":"Taud, H., Mas, J.F.: Multilayer perceptron (MLP). In: Camacho Olmedo, M.T., Paegelow, M., Mas, J.-F., Escobar, F. (eds.) Geomatic Approaches for Modeling Land Change Scenarios. LNGC, pp. 451\u2013455. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-60801-3_27"},{"key":"53_CR35","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-7908-2604-3_16","volume-title":"Proceedings of COMPSTAT'2010","author":"L\u00e9on Bottou","year":"2010","unstructured":"Bottou, L.: Large-scale machine learning with stochastic gradient descent. In: Lechevallier, Y., Saporta, G. (eds.) Proceedings of COMPSTAT 2010, pp. 177\u2013186. Physica-Verlag HD, Heidelberg (2010)"},{"key":"53_CR36","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/B978-0-12-701721-1.50014-4","volume-title":"Finance Constraints and the Theory of Money","author":"S.C. Tsiang","year":"1989","unstructured":"Tsiang, S.C.: The rationale of the mean-standard deviation analysis, skewness preference, and the demand for money. In: Finance Constraints and the Theory of Money, pp. 221\u2013248 (1989)"},{"issue":"4","key":"53_CR37","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1016\/j.jesp.2013.03.013","volume":"49","author":"C Leys","year":"2013","unstructured":"Leys, C., Ley, C., Klein, O., Bernard, P., Licata, L.: Detecting outliers: do not use standard deviation around the mean, use absolute deviation around the median. J. Exp. Soc. Psychol. 49(4), 764\u2013766 (2013)","journal-title":"J. Exp. Soc. Psychol."},{"key":"53_CR38","unstructured":"Chen, T., He, T., Benesty, M.: Xgboost: extreme gradient boosting. R package version 0.4-2, pp. 1-4 (2015)"},{"key":"53_CR39","unstructured":"Kurtulmus, A.B., Daniel, K.: Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain. Algorithmia Res. (2018)"},{"key":"53_CR40","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-319-98446-9_35","volume-title":"Computational Collective Intelligence","author":"MS Rana","year":"2018","unstructured":"Rana, M.S., Rahman, S.S.M.M., Sung, A.H.: Evaluation of tree based machine learning classifiers for android malware detection. In: Nguyen, N.T., Pimenidis, E., Khan, Z., Trawi\u0144ski, B. (eds.) ICCCI 2018. LNCS (LNAI), vol. 11056, pp. 377\u2013385. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-98446-9_35"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Image Processing and Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9181-1_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T02:18:58Z","timestamp":1563502738000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9181-1_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811391804","9789811391811"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9181-1_53","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RTIP2R","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Recent Trends in Image Processing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Solapur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rtip2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/rtip2r.org\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"374","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"173","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"-","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}